How do I ensure that I do not get a time-delayed ransomware attack?

This page summarizes the projects mentioned and recommended in the original post on /r/DataHoarder

Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
  • Rsnapshot

    a tool for backing up your data using rsync (if you want to get help, use https://lists.sourceforge.net/lists/listinfo/rsnapshot-discuss)

  • restic

    Fast, secure, efficient backup program

  • Restic is one open-source option for incremental cloud backups: https://restic.net/

  • WorkOS

    The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.

    WorkOS logo
  • cshatag

    Detect silent data corruption under Linux using sha256 stored in extended attributes

  • scorch

    Silent CORruption CHecker and filesystem audit tool

  • The method I use is to run scorch every night to compute hashes for new files and check around 12% of old files for hash errors every night. Even if your backup is the same day as a ransomware attack, you will still catch it if the attack hits enough files for one to get randomly scrubbed. Also scorch is designed around making the hash database small and independent from the rest of the system, so you can automate copying it to a bunch of different places.

  • Rdiff-backup

    Reverse differential backup tool, over a network or locally.

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

    InfluxDB logo
NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts